wp-import-export-lite
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121insert-headers-and-footers
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121wp-pagenavi
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121This exploit is for CA BrightStor HSM version <= r11.5 on Windows XP (SP2 Professional) and Windows Server 2003 (Enterprise Edition). It allows for a remote stack-based overflow and denial of service (DoS) attack. The exploit code is released by NiceNameCrew and discovered by iDefense.
The Adult Filter 1.0 software is vulnerable to a buffer overflow vulnerability, specifically a Stack-based Buffer Overflow. This vulnerability allows an attacker to execute arbitrary code on the target system by sending a specially crafted request that exceeds the buffer size allocated for processing the request. This can lead to remote code execution, giving the attacker full control over the affected system.
Phptpoint hospital management system suffers from multiple SQL injection vulnerabilities that allow an attacker to bypass the login page and authenticate with admin, and then easily get database information or execute arbitrary commands.
In the 3.1 version of Ekushey Project Manager CRM, Stored XSS has been discovered in the input and upload sections, as demonstrated by the name parameter to the index.php/admin/client/create URI.
The script db/tiki-db.php and tiki-imexport_languages.php in TikiWiki version <= 1.9.8.1 are vulnerable to local file inclusion attacks. An attacker can exploit these vulnerabilities to include arbitrary local files and potentially execute malicious code.
This exploit script creates a file with a specific content that triggers a crash in the ADULT FILTER 1.0 software. By adding the content of the file to the 'Black Domain List' in the program's options, it causes the program to crash.
This exploit allows an attacker to remotely disclose files on a system using the Jakarta Slide WebDav implementation. The vulnerability is triggered by sending a specially crafted LOCK request to the target host. The exploit requires authentication to work.
This module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the SEARCHREPORT command, a stack-based buffer overflow occurs.
This module exploits elevation of privilege vulnerability that exists in Windows 7 and 2008 R2 when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Siebel CRM application was found to be vulnerable to Excel Macro injection vulnerability, in places where user input is allowed (in text form) and the input can then be exported in CSV form. An attacker can change user information to include in his input a malicious excel function. The function will then be executed on the victim’s machine, once the victim exports the details in CSV format and opens the exported file in Microsoft Excel.